Enter Title

Glossary

As you surf through the IACP Center for Social Media and other social media sites on the Web, you may come across new terms, or old terms with new meanings. All this social media jargon does not need to be confusing, and this glossary will provide you with definitions to clarify these new terms.

Glossary

  • Algorithm: process or set of rules used to perform a task; algorithms are used to generate online search results and other online procedures.

  • App: short for Application, an app is a program or add-on, usually for Facebook or for a mobile device. Its purpose is to deepen user interaction and provide greater depth of functionality and engagement.

  • Augmented reality: direct or indirect view of a physical real-world environment that has been augmented or modified by computer-generated data such as sound, video, graphics, or GPS data.

  • Avatar: a computer user’s representation of himself or herself, this may be a three-dimensional character used in virtual worlds and video games or a two-dimensional icon used in various Internet forums.

  • Blog: a self-published diary or commentary on a particular topic that may allow visitors to post responses, reactions, or comments. The term is short for “Web log.”

  • Blogger: a blogging platform also known as Blogspot or someone who blogs.

  • Blogosphere: refers to blogs and blog interactions on the Internet.

  • Blogroll: a list of blogs that a blogger might recommend by providing a list of links on their site.

  • Brightkite: a location-based social media platform.

  • Cache: a collection of stored data on a computer that can be accessed quickly if required in the future.

  • Chat: an interaction on a website with a number of people adding text items one after another into the same space at nearly the same time. This differs from a forum because conversations happen in “real time.”

  • Circles: on Google+, groups that a user can place their contacts in based on their relationship. A contact can be placed in multiple Circles, and users can choose from the default Circles or create their own. Users can add contacts to Circles even if that contact does not use Google+.

  • Clickjacking: a deceptive practice where users are misled into visiting seemingly innocuous websites, providing information, and then spreading the scam to their contacts; this is often done by having users click a button that appears to perform another function.

  • Cloud: the virtual location of computing resources such as servers, applications, and data used in cloud computing. Cloud computing allows traditional IT services to be housed on the Internet; usually to increase capabilities without the need for enhanced physical infrastructure, software, or training.

  • Copyright: the legal right granted to an author, composer, playwright, publisher, or distributor to exclusive publication, production, sale, or distribution of a literary, musical, dramatic, or artistic work.

  • Counter-radicalization: the activities and strategies undertaken by government, law enforcement, non-governmental organizations, and others to challenge and oppose the violent extremist ideology and the processes of radicalization to violence.

  • Craigslist: an online classified for posting ads for jobs, housing, services, items for sale, and other goods and services.

  • Crowdsourcing: the act of a company or institution taking a function once performed by employees and outsourcing it to an undefined (and generally large) network of people in the form of an open call.

  • Cyberbullying: willful and repeated harm inflicted through the use of computers, cell phones, and other electronic devices.

  • Cybersquatting: acting with a bad faith intent to profit from the goodwill of another's trademark, by registering, trafficking in, or using a domain name that is identical to, or confusingly similar to a distinctive mark, or dilutive of a famous mark, without regard to the goods or services of the parties.

  • Cybervetting: an assessment of a person’s qualifications to hold a position or security clearance using information found on the Internet.

  • Direct Message: on Twitter, a private tweet sent to a specific user.

  • Download: to transfer data to a computer or device from a larger computer system or the Internet; the opposite of upload.

  • E-mail: short for electronic mail; a method of exchanging messages over the Internet or an intranet.

  • EdgeRank: an algorithm developed by Facebook that determines what is displayed (and how high it is displayed) on a user's news feed.

  • Emoticon: a facial expression represented by a combination of punctuation, symbols, or letters used to indicate emotion.

  • Facebook: a social network site that allows users to create profiles, send messages, create networks of friends and fans, and share content.

  • Feed: a list of a user’s recent updates; the feed can be posted on other sites.

  • Flash mobs: a group of people, usually organized through social media or text message, that gather at a location to perform a specific action before dispersing. These actions may be for entertainment or criminal purposes.

  • Flickr: a site that allows users to upload and share photographs and pictures.

  • Follower: on Twitter, a person who subscribes to receive tweets from a registered user.

  • Formspring: an online forum that allows users to ask and answer questions.

  • Forum: discussion area on a website where people can post messages or comment on existing messages at any time.

  • Foursquare: a location-based social media platform.

  • Friend: an individual who is part of another individual’s network.

  • Geolocation/Geotagging: the incorporation of location data. This may be used on social media platforms to notify people where a user is at a given time.

  • Ghost profile or undercover profile: a social networking profile created by a person using information that makes the profile appear to be that of someone else for the purpose of online undercover investigations.

  • Gold farming: the playing of multi-player online games to acquire in-game currency or items that are then sold to other players for real-world currency. Gold farming takes advantage of the fact that much time is needed to earn in-game currency and some players are willing to spend money in order to save many hours of playing time, while others are willing to spend hours of playing time in order to earn money.

  • Google Latitude: a location-based mobile application developed by Google that allows users to make their location information available to others.

  • Google+: Google's social networking platform that combines multiple online functions including text and video chat.

  • Gowalla: a location-based social media platform.

  • Hack: to gain unauthorized access to a computer system or network.

  • Hacktivist: hackers who commit a computer crime to communicate a socially or politically motivated message.

  • Hangout: on Google+, a group video chat that allows up to 10 users to send messages, talk to each other via webcams, and watch YouTube videos together.

  • Hashtag: the symbol #; precedes a term in a tweet to allow that subject to be more searchable; typically used on Twitter and other social media sites.

  • Homegrown violent extremist: a citizen or long-term resident in a western country who has rejected western cultural values, beliefs, and norms in favor of a violent extremist ideology. The homegrown violent extremist intends to commit terrorism inside western countries or against their interests.

  • HootSuite: a social media dashboard that allows users to set up team collaboration; schedule updates to Twitter, Facebook, LinkedIn, Wordpress, and other social media sites; as well as track trends and conduct searches across social media platforms.

  • Hyperlink: commonly referred to as links, hyperlinks allow users to move to other portions of a webpage or document, or to a new webpage or document. A hyperlink is typically activated by clicking on highlighted or different color text or an image.

  • Hyperlocal: relating to a very specific and often small community. This community may be geographically or virtually defined.

  • Impersonate: to pretend to be someone else. Impersonation with intent to deceive is against the terms of service of several social media sites and may be reported.

  • Influence: an individual's importance online.

  • Instant Messaging: a form of real-time communication between two or more people based on typed text; the text is conveyed via the Internet or an intranet.

  • Internet: a global system of interconnected computer networks which host a variety of applications that allow users to communicate and interact with each other.

  • Internet searching: a process of locating and retrieving data (written documents and other media such as images, video, and audio files) available on the Internet.

  • Internet-facilitated radicalization: is the process by which an individual radicalizes to violence primarily as a result of online media including social networks.

  • IP Address: an Internet Protocol (IP) Address is a unique numerical label assigned to all devices that are connected to the Internet. Because the number is unique to a device, it can be used to locate a device that has engaged in certain activity on the Internet.

  • ISP: ISP stands for Internet Service Provider, a company that offers customers access to the Internet.

  • Klout: a service that measures a user's online influence.

  • Likejacking: a form of clickjacking where Facebook users unintentionally “Like” a page which then spreads the scam to others.

  • LinkedIn: a social network site focused on professional network connections.

  • LiveJournal: a blogging platform.

  • Lone terrorist: one who commits terrorist acts alone and without witting support from others. The perpetrator may have contact with others, but those other individuals are not aware of the perpetrator's plans or intentions. The individual may be estranged or rejected from a terrorist or like-minded group, or may follow the ideology or a leaderless resistance movement. During the planning and execution states of his or her attack, the lone terrorist avoids collaboration – and often, contact – with other known violent extremists. As a result, the lone terrorist might be freed from the strategic concerns and constraints on tactics and targets that affect terrorist organizations. He or she may also have a lower operational profile, thus more difficult to detect.

  • Meme: a concept that spreads via the Internet; a meme may evolve or spread quickly (become viral).

  • Mention: using the @ symbol to reference another user.

  • Metasearch engine: a search engine that submits queries to multiple search engines and returns an aggregate result of multiple searches.

  • Microblog: a service that allows users to send short (usually character restricted) messages out to a network of followers; examples include Twitter and Nixle.

  • Monitoring: the continuous conduct of searches for any discussions, posts, videos, blogs, online conversations, etc. of your department with the purpose of discovering what is being said about you and being able to correct false information or rumors.

  • MySpace: a social network site.

  • Nixle: a Community Information Service available to local, state, and federal government entities and allows these entities to send messages by text, e-mail, and Internet posts to subscribers.

  • Online behaviors: broadly includes all activities using computer technology, including the transmission of information, completion of tasks, replication of noncomputer activities, and creation of novel activities.

  • ooVoo: video chat and video conferencing software for computers, tablets, and smartphones.

  • Orkut: a social network run by Google where users create profiles and share content.

  • Page: the specific portion of a social media website where content is displayed and managed by an individual or individuals with administrator rights.

  • Phishing: the fraudulent practice of sending electronic messages claiming to be a legitimate company in order to induce individuals to reveal sensitive data such as user names, passwords, and credit card details.

  • Pin: an image or video on Pinterest. Images/videos can be added, or pinned, from a website or from a computer file.

  • Platform: a hardware and/or software architecture that serves as a base.

  • Podcast: a Web-based audio broadcast usually available by some form of subscription. Comes from the combination of the acronym POD, play on demand, and broadcast.

  • Post: content, in any format, placed on a website or the act of publishing content on a website.

  • Privacy settings: an option many social media sites offer to allow a user to determine the level to which their information is made available to others.

  • Profile: information that users provide about themselves on a social networking site.

  • QR Code: a Quick Response (QR) code is a two-dimensional barcode intended for scanning by a mobile phone.

  • Radicalization to violence: radicalization is the process by which individuals – usually, but not always, young people – are introduced to an overtly ideological message and belief system that encourages movement from moderate, mainstream beliefs towards extreme views. Radicalization becomes a threat when individuals espouse or engage in violence as a means of promoting political, ideological, or religious extremism.

  • Retweet: abbreviated RT; sending out a tweet to your followers that was generated by another user.

  • RSS: short for Real Simple Syndication or Rich Site Summary; format sites can use to indicate they have been updated, people can then subscribe to receive the stream of updates via an RSS reader.

  • Screencast: the digital recording of computer screen output.

  • Screenshot: image that shows the contents of a digital screen display; also referred to as a screen capture or screen grab.

  • Search Engine Optimization (SEO): the process of improving the visibility of a website or webpage in search results.

  • Second Life: an online virtual community.

  • Skype: a voiceover Internet Protocol Service and software program that allows users to communicate by placing calls to telephones as within the computer network; there is also the capability for video calling and conferencing, instant messaging, and file sharing.

  • Social media: a category of Internet-based resources that integrate user-generated content and user participation. This includes, but is not limited to, social networking sites (Facebook, MySpace), microblogging sites (Twitter), photo- and video-sharing sites (Flickr, YouTube), wikis (Wikipedia), blogs, and news sites (Digg, Reddit).

  • Social networks: online platforms where users can create profiles, share information, and socialize with others using a range of technologies.

  • Socially reinforced violent extremist: one who may have underlying tendencies for participating in violent extremist activity (for example, feelings or persecution or isolation, violent personality, etc.) but would not proceed without reinforcement from social interactions with like-minded others, often using online social networking tools.

  • Sparks: on Google+, news feeds related to specific topics selected by the user.

  • Speech: expression or communication of thoughts or opinions in spoken words, in writing, by expressive conduct, symbolism, photographs, video, or related forms of communication.

  • Subscribe: to authorize to receive or access updates or messages.

  • Tag: label attached to Web content, such as a blog post, to indicate what content is about; tags are also used in HTML coding to format text.

  • To Friend: the act of requesting someone to be your friend on Facebook.com, in which they can accept or reject you. If they accept, you become a part of their network and they become a part of your network.

  • Traffic: amount of data sent and received by visitors to a Website, Webpage, or social media site.

  • Trending: a word, phrase, or topic that is popular at a given moment, particularly on Twitter.

  • Tweet: a post or status update on Twitter.

  • TweetDeck: a social media dashboard that allows users to connect their Twitter, Facebook, Myspace, LinkedIn, and other social media accounts. Users can create columns and groups that will allow them to save and organize searches, arrange their friends and followers to make them easier to follow, and schedule and post updates to their social media platforms.

  • Tweetjacking: reposting another user’s tweet without giving credit and/or leaving out an important part of the original message for your own means or agenda. Tweetjacking can also refer to the act of breaking into someone else’s Twitter account and sending messages as that user.

  • Twitter: a microblogging tool that allows users to send short messages (up to 140 characters) that will immediately be distributed to their network of followers.

  • Typosquatting: the act of registering the misspelling of a brand name or trademarked term in order to capture the Internet traffic from a legitimate entity.

  • Upload: to transfer data from a personal computer or device to a larger entity such as a website.

  • URL: Uniform Resource Locator; the global address of documents and resources found on the World Wide Web.

  • UStream: on online platform that allows users to steam live video feeds.

  • Vimeo: a video-sharing site.

  • Violent extremist: one who encourages, endorses, condones, justifies, or supports the commission of a violent or criminal act to achieve political, ideological, religious, or economic goals against those he or she opposes.

  • Viral: term used to describe online content that has become increasingly popular across the Web.

  • Virtual community: online communities that feature computer simulated environments in which users can interact.

  • Visual search engine: a search engine that looks for information on the World Wide Web through the input of an image.

  • Vlog: a video blog.

  • Wall: the portion of a Facebook page that displays user updates and comments.

  • Web 2.0: the second generation of the World Wide Web focused on shareable, user-generated content, rather than static Web pages. Some use this term interchangeably with social media.

  • Web presence: any information available on the Internet about an individual which is also under the control of that individual.

  • Webpage: a multimedia document (may contain text, images, audio, and/or video) that is accessible on the Internet. A webpage may be static (a user only views) or interactive (a user may input data and alter the content). Webpages often have links which direct users to other webpages.

  • Website: a collection of interlinked webpages which are generally authored, hosted and maintained by a single entity. Websites are commonly used to represent entities such as government organizations, businesses or persons, or used as places for individuals with common interests to meet and interact.

  • Widget: a small block of content that a site can provide to users for implementing on a blog or website. Widgets have a specific purpose such as showing weather forecasts, stock quotes, or news updates.

  • Wiki: Webpage(s) that can be edited collaboratively.

  • WordPress: a blogging platform.

  • YouTube: an online video community that allows users to upload video content, share that content, and view the content uploaded by others.

Created by Matrix Group International, Inc.